Analysis
-
max time kernel
3567115s -
max time network
148s -
platform
android_x64 -
resource
android-x64-arm64 -
submitted
11-09-2021 11:26
Static task
static1
Behavioral task
behavioral1
Sample
DHL98.apk
Resource
android-x64-arm64
0 signatures
0 seconds
General
-
Target
DHL98.apk
-
Size
2.6MB
-
MD5
6a7e746ade78143f4ca2a7a4ce33f250
-
SHA1
452abfbc77dc37780b571d0ce4f623ac960d89ff
-
SHA256
34d3338408dfd8244ba7ee655f558f0e06e0982cb76584f88707f6d0bdcf6a2c
-
SHA512
d4a82b20a5acf601e36b2c1abcdc1a6275a6baca43746e4a7f525368f1db5e699369efe1c0656172f962b44bb4c2f421bf526d0466e24f094af623e10d546245
Score
7/10
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.dailyyoga.cn/code_cache/secondary-dexes/base.apk.classes1.zip 3944 com.dailyyoga.cn -
Uses reflection 1 IoCs
description pid Process Invokes method android.view.ViewGroup.makeOptionalFitsSystemWindows 3944 com.dailyyoga.cn